data/reports: add 4 high-priority reports
- data/reports/GO-2025-3764.yaml
- data/reports/GO-2025-3765.yaml
- data/reports/GO-2025-3770.yaml
- data/reports/GO-2025-3802.yaml
Fixes golang/vulndb#3764
Fixes golang/vulndb#3765
Updates golang/vulndb#3770
Fixes golang/vulndb#3802
Change-Id: I8cf9e138f1720acbc209fa0bf5dcbe723aba5614
Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/688355
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Roland Shoemaker <roland@golang.org>
diff --git a/data/osv/GO-2025-3764.json b/data/osv/GO-2025-3764.json
new file mode 100644
index 0000000..881a794
--- /dev/null
+++ b/data/osv/GO-2025-3764.json
@@ -0,0 +1,87 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3764",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-44905",
+ "GHSA-6xp3-p59p-q4fj"
+ ],
+ "summary": "SQL injection vulnerability via the component /types/append_value.go in github.com/go-pg/pg",
+ "details": "SQL injection vulnerability via the component /types/append_value.go in github.com/go-pg/pg",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/go-pg/pg",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-pg/pg/v9",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-pg/pg/v10",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/advisories/GHSA-6xp3-p59p-q4fj"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/go-pg/pg/blob/30e7053c6cacdd44d06cf2b92183b49188b7c922/types/append_value.go#L151"
+ },
+ {
+ "type": "WEB",
+ "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf"
+ },
+ {
+ "type": "WEB",
+ "url": "https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3764",
+ "review_status": "REVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3765.json b/data/osv/GO-2025-3765.json
new file mode 100644
index 0000000..3c888fc
--- /dev/null
+++ b/data/osv/GO-2025-3765.json
@@ -0,0 +1,57 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3765",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2024-44906",
+ "GHSA-h4h6-vccr-44h2"
+ ],
+ "summary": "SQL injection vulnerability in github.com/uptrace/bun/driver/pgdriver",
+ "details": "SQL injection vulnerability in github.com/uptrace/bun/driver/pgdriver",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/uptrace/bun/driver/pgdriver",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/advisories/GHSA-h4h6-vccr-44h2"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/uptrace/bun/blob/1573ae7c2fffad1a7f72fd2d205e924b2fd4043b/driver/pgdriver/format.go#L62"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/uptrace/bun/tree/master/driver/pgdriver"
+ },
+ {
+ "type": "WEB",
+ "url": "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf"
+ },
+ {
+ "type": "WEB",
+ "url": "https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3765",
+ "review_status": "REVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3770.json b/data/osv/GO-2025-3770.json
new file mode 100644
index 0000000..e0732d4
--- /dev/null
+++ b/data/osv/GO-2025-3770.json
@@ -0,0 +1,115 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3770",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "GHSA-vrw8-fxc6-2r93"
+ ],
+ "summary": "Host Header Injection which Leads to Open Redirect in RedirectSlashes in github.com/go-chi/chi",
+ "details": "Host Header Injection which Leads to Open Redirect in RedirectSlashes in github.com/go-chi/chi",
+ "affected": [
+ {
+ "package": {
+ "name": "github.com/go-chi/chi",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-chi/chi/v2",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-chi/chi/v3",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-chi/chi/v4",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ },
+ {
+ "package": {
+ "name": "github.com/go-chi/chi/v5",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "5.2.2"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {}
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/go-chi/chi/security/advisories/GHSA-vrw8-fxc6-2r93"
+ },
+ {
+ "type": "FIX",
+ "url": "https://github.com/go-chi/chi/commit/1be7ad938cc9c5b39a9dea01a5c518848928ab65"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3770",
+ "review_status": "REVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/osv/GO-2025-3802.json b/data/osv/GO-2025-3802.json
new file mode 100644
index 0000000..ac23c91
--- /dev/null
+++ b/data/osv/GO-2025-3802.json
@@ -0,0 +1,63 @@
+{
+ "schema_version": "1.3.1",
+ "id": "GO-2025-3802",
+ "modified": "0001-01-01T00:00:00Z",
+ "published": "0001-01-01T00:00:00Z",
+ "aliases": [
+ "CVE-2025-53547",
+ "GHSA-557j-xg8c-q2mm"
+ ],
+ "summary": "Helm vulnerable to Code Injection through malicious chart.yaml content in helm.sh/helm",
+ "details": "Helm vulnerable to Code Injection through malicious chart.yaml content in helm.sh/helm",
+ "affected": [
+ {
+ "package": {
+ "name": "helm.sh/helm/v3",
+ "ecosystem": "Go"
+ },
+ "ranges": [
+ {
+ "type": "SEMVER",
+ "events": [
+ {
+ "introduced": "0"
+ },
+ {
+ "fixed": "3.18.4"
+ }
+ ]
+ }
+ ],
+ "ecosystem_specific": {
+ "imports": [
+ {
+ "path": "helm.sh/helm/v3/pkg/downloader",
+ "symbols": [
+ "Manager.Build",
+ "Manager.Update",
+ "writeLock"
+ ]
+ }
+ ]
+ }
+ }
+ ],
+ "references": [
+ {
+ "type": "ADVISORY",
+ "url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm"
+ },
+ {
+ "type": "WEB",
+ "url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571"
+ },
+ {
+ "type": "WEB",
+ "url": "https://news.ycombinator.com/item?id=44506696"
+ }
+ ],
+ "database_specific": {
+ "url": "https://pkg.go.dev/vuln/GO-2025-3802",
+ "review_status": "REVIEWED"
+ }
+}
\ No newline at end of file
diff --git a/data/reports/GO-2025-3764.yaml b/data/reports/GO-2025-3764.yaml
new file mode 100644
index 0000000..d002576
--- /dev/null
+++ b/data/reports/GO-2025-3764.yaml
@@ -0,0 +1,26 @@
+id: GO-2025-3764
+modules:
+ - module: github.com/go-pg/pg
+ vulnerable_at: 8.0.7
+ - module: github.com/go-pg/pg/v9
+ vulnerable_at: 9.2.1
+ - module: github.com/go-pg/pg/v10
+ vulnerable_at: 10.13.0
+summary: |-
+ SQL injection vulnerability via the component /types/append_value.go in
+ github.com/go-pg/pg
+cves:
+ - CVE-2024-44905
+ghsas:
+ - GHSA-6xp3-p59p-q4fj
+references:
+ - advisory: https://github.com/advisories/GHSA-6xp3-p59p-q4fj
+ - web: https://github.com/go-pg/pg/blob/30e7053c6cacdd44d06cf2b92183b49188b7c922/types/append_value.go#L151
+ - web: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf
+ - web: https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw
+notes:
+ - No known fix commit for any specified version.
+source:
+ id: GHSA-6xp3-p59p-q4fj
+ created: 2025-07-16T11:06:41.876419-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3765.yaml b/data/reports/GO-2025-3765.yaml
new file mode 100644
index 0000000..64ec45e
--- /dev/null
+++ b/data/reports/GO-2025-3765.yaml
@@ -0,0 +1,21 @@
+id: GO-2025-3765
+modules:
+ - module: github.com/uptrace/bun/driver/pgdriver
+ vulnerable_at: 1.2.14
+summary: SQL injection vulnerability in github.com/uptrace/bun/driver/pgdriver
+cves:
+ - CVE-2024-44906
+ghsas:
+ - GHSA-h4h6-vccr-44h2
+references:
+ - advisory: https://github.com/advisories/GHSA-h4h6-vccr-44h2
+ - web: https://github.com/uptrace/bun/blob/1573ae7c2fffad1a7f72fd2d205e924b2fd4043b/driver/pgdriver/format.go#L62
+ - web: https://github.com/uptrace/bun/tree/master/driver/pgdriver
+ - web: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf
+ - web: https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw
+notes:
+ - No known fix commit.
+source:
+ id: GHSA-h4h6-vccr-44h2
+ created: 2025-07-16T11:06:35.100738-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3770.yaml b/data/reports/GO-2025-3770.yaml
new file mode 100644
index 0000000..85cf8d0
--- /dev/null
+++ b/data/reports/GO-2025-3770.yaml
@@ -0,0 +1,28 @@
+id: GO-2025-3770
+modules:
+ - module: github.com/go-chi/chi
+ vulnerable_at: 1.5.5
+ - module: github.com/go-chi/chi/v2
+ vulnerable_at: 2.1.1
+ - module: github.com/go-chi/chi/v3
+ vulnerable_at: 3.3.5
+ - module: github.com/go-chi/chi/v4
+ vulnerable_at: 4.1.3
+ - module: github.com/go-chi/chi/v5
+ versions:
+ - fixed: 5.2.2
+ vulnerable_at: 5.2.1
+summary: |-
+ Host Header Injection which Leads to Open Redirect in RedirectSlashes
+ in github.com/go-chi/chi
+ghsas:
+ - GHSA-vrw8-fxc6-2r93
+references:
+ - advisory: https://github.com/go-chi/chi/security/advisories/GHSA-vrw8-fxc6-2r93
+ - fix: https://github.com/go-chi/chi/commit/1be7ad938cc9c5b39a9dea01a5c518848928ab65
+notes:
+ - Fix commit exists but no official patched version has been published.
+source:
+ id: GHSA-vrw8-fxc6-2r93
+ created: 2025-07-16T11:06:31.667002-04:00
+review_status: REVIEWED
diff --git a/data/reports/GO-2025-3802.yaml b/data/reports/GO-2025-3802.yaml
new file mode 100644
index 0000000..fd874a0
--- /dev/null
+++ b/data/reports/GO-2025-3802.yaml
@@ -0,0 +1,28 @@
+id: GO-2025-3802
+modules:
+ - module: helm.sh/helm/v3
+ versions:
+ - fixed: 3.18.4
+ vulnerable_at: 3.18.3
+ packages:
+ - package: helm.sh/helm/v3/pkg/downloader
+ symbols:
+ - writeLock
+ derived_symbols:
+ - Manager.Build
+ - Manager.Update
+summary: |-
+ Helm vulnerable to Code Injection through malicious chart.yaml content in
+ helm.sh/helm
+cves:
+ - CVE-2025-53547
+ghsas:
+ - GHSA-557j-xg8c-q2mm
+references:
+ - advisory: https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm
+ - web: https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571
+ - web: https://news.ycombinator.com/item?id=44506696
+source:
+ id: GHSA-557j-xg8c-q2mm
+ created: 2025-07-16T11:06:14.161761-04:00
+review_status: REVIEWED